Analysis
-
max time kernel
195s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2023, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
enable-disable-com.motorola.mtk.gba.xml
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
enable-disable-com.motorola.mtk.gba.xml
Resource
win10v2004-20230220-en
General
-
Target
enable-disable-com.motorola.mtk.gba.xml
-
Size
348B
-
MD5
9debcddcd4cbb44d37a10687a0886a71
-
SHA1
df614be5ef57e537fd0a76a083d72fbce2b36c1d
-
SHA256
5764917678357b50e7c5cdca482dce584635b21bf478e02dcb7524327ba12f74
-
SHA512
9120e550050e3f6b4b79ec914963a1a45de62c4ee75818cbfd46443593bb443c12e0ea2b67cc9f4b5bf6031a82d903f250398301f2d8891e21210c133c19e7bd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3A3EA9D1-07CF-11EE-9918-F2C06CA9A191} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "393194686" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e31911dc9bd901 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000956bf736b8cdd8479dae489cb1a14b080000000002000000000010660000000100002000000037358dcbefc39797ce37685d331d2bcf2225e5594124d4c6732b14784476a810000000000e8000000002000020000000e316bca619bd3e54c0815af63541470a03319b8c8ade049825771e168d5854a820000000efa00373313338740c12bd55a16737849ba3c0275c2e4ca7168dc5744519a3f14000000097d75215d94c05ab6e5679a6c5c7cb2ec2263f0729bd1fda9d53b90c13e2082edda1b7ec881b3cddf10051b7a7c1cecf788a0e950d291f6648416840192595e2 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1292 wrote to memory of 460 1292 MSOXMLED.EXE 28 PID 1292 wrote to memory of 460 1292 MSOXMLED.EXE 28 PID 1292 wrote to memory of 460 1292 MSOXMLED.EXE 28 PID 1292 wrote to memory of 460 1292 MSOXMLED.EXE 28 PID 460 wrote to memory of 1312 460 iexplore.exe 29 PID 460 wrote to memory of 1312 460 iexplore.exe 29 PID 460 wrote to memory of 1312 460 iexplore.exe 29 PID 460 wrote to memory of 1312 460 iexplore.exe 29 PID 1312 wrote to memory of 1464 1312 IEXPLORE.EXE 30 PID 1312 wrote to memory of 1464 1312 IEXPLORE.EXE 30 PID 1312 wrote to memory of 1464 1312 IEXPLORE.EXE 30 PID 1312 wrote to memory of 1464 1312 IEXPLORE.EXE 30
Processes
-
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\enable-disable-com.motorola.mtk.gba.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome2⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5649b5bf45eedcaff273cc087602b5f44
SHA1ce059f1dbcfc8b8583fea4c8a1089c46f572a067
SHA256cb6037ea45c1cf9942051b478c9f781f753e7d227863a044a09750cb88856564
SHA512daa8d2a7a86cb360a6b5c91e365c0ef6eb8266dfa64498c67725f1c64f041b0fa7edf785a3fa2f3778fddff3273f641379cebd96eee27330a56bab234ba3ab5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a3c2aba9e3a66114eda512351e2405
SHA1dbeebe2a209ca056f3edbcd5cd4ad68bd38a2ec5
SHA256a3c62925035683c858ab9685b7a60acf06f0c14d1e0bdc7e7ba552b5a05a6a6d
SHA5129f0a82ecf0b7e92b8a29c0b4f459692338eeb516fc60aaee6eea651287cc62b2746a21ac533a33e948fdfde7dac1fd9cd59304cf3800a4b29a6b4bd9d66a5f3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f24285faab0a1ce554de6994bda34bb
SHA1dd867d99435dfb4b6d76a3cd845c831a03da3184
SHA256a60f9edd404bd74e2b2af29e561b42d3ff6034dad1d2c0ab9a67e8383b3db733
SHA512cbb0c1a7b014cab13eabf23fce4bd1b28163ec8459680f05d2cf19a224995f43ccb3ce37d5df58d8adcb0ce4b43d3ffdae81e0122573ba325a4e76f01feb04d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5513c63f1ff7de5d53717839fd2626947
SHA1e6491825832a90010e5d9f180ecad37f832c2699
SHA2565f895d7695a97a702381bb6d43275a2195b1302ee2a6aab11b28929777d67418
SHA51261c01ebee9b1547edcab684e06539373c71899cd5ac6da8999dc8a2397943b9bf1a3d6c64d05451d387568547042a69dbb7138acd8a2c838d193a131c00f5934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579ec689fbe31f255318104b57df5d035
SHA18a7c38f75a03e189a201541e29fbe5ebd5e404fa
SHA25614581aa096496017e918188ae8478dae92643c6ff090bcfd2ac6563d153092e5
SHA51233c3ca21e0b0c39d5f734803d793435fc49fe2f70b4099a7917dc17dac4507337dbfe3a24a9567872c21bc3c656ef0adb88c1558739425d21e80edc773bd98e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f8f26c2597659bd8995057d02cfd6cc
SHA1c6fdc95d1bc1e9f2f4f92c17c08ba195e9b9b5a4
SHA256541eed12b6c5e7de3fcb29e3ed6634a780433dc0433a95a26a991ac819c85a8a
SHA51297f42426ffda6104e3b840da0c6b39958ba12f40510d8e16006d9fe2a5f0d1d679df74263f2da519e83bd415443fd65abd44be1b31fd2f65abd5a2c96faddbb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc12b73976d7998566e87eeddba19c92
SHA1be972b377aa9d7f23897f6f5eb5295fd6c84781c
SHA256d3fb36c4c11e60f2637464d2bd9c91314ad3f425bdd13f0a8829236dd0482a30
SHA512b7964c7d39221c30161396ea81a3650678202cb963d42dc920a241fc30d2cc718eda907ab5c65d9f827a9dedda47824b0799fe2a04caba99600b651fd746ae8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b41aa667fd3857fb7d002543f67da110
SHA184f77251f255247dc5ebdfbd92b9c1b9f42e67a6
SHA2567f7efd9714d252fe6ead176cfec31e3a58764dcbf7e6d2118577d7f83381dd9c
SHA512f55957e0619b00df1671e92e82dba06a3d4b341a706b8cf226bf275a31cda5e7707067a7e9c4dede14ca08afefde21fe93c14c0c43e04280a443b79e2067997a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e59cb956cb320c9226c7d11cc620ece
SHA1939effe09dabd4237046aaa762c31623202301e6
SHA256c8e461bba5e4041861b50b62ce668b56229cce3a3af43a7f454a9cc22fb0e523
SHA51205b6947bacaa2f07bfc6b1ff5ef2337c1555a3bd8696ad3d6486efd96ff6cf260ba42872cdd2dc2229ac7cbfbd728ce5816330e12165baf91afbe26b02a68edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c6e4b6d7f082f638a09c5ca525704e3
SHA12ea8e1ee597fbb71fead4a28518ca5df9390f9cb
SHA256c39430d141c5f9b61d9746f048eedf8719f9047d5f0de5612d67f7cd68da4651
SHA512b5db9877e52220ef0471299f28acc43001cfd1c05f9ce3c5bf0e4f17a07e5b02d0c842c9183d6ae5d4bd7349eec3bfeb605a7d983115d61f82977ac75e32cfd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e65101f645a7e3ecfb3a801e6ce0c36
SHA195706a9c76b2c2b3b31d2236693379ab79f0b24b
SHA25663f7d92176df4d7abb387b10ded95b9592788c922d666ac30d6f53b51a4dc99e
SHA5124e18bb26fcb143790b8e5beee0b92279a79654d57aeacea3ab5a488a4489bb332203fdfdac53b91200f239e89e3d1ca1be5b86f132638bb44ec6719d3da6815a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4D33E1QE\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD53fd818399bce9ae490653b95f8f29aa8
SHA155b8bca3f04dbb908b8224b38d240b744c22974e
SHA256c2f13b541eae800cf03c96ab1a6d29f3af26db1fad886c51c2078d7bab8303eb
SHA512cac37d897df62b88c2ece03f4ce22cf628889f854a0ced45b5e20f2807ece725c4c616a6dd25d461457017e7d7fa0a3678e287950aedcbc8fc9b349ac7d78a6c